TR-CS _ 01 _ 07 A Game Theoretic Approach toward Multi-Party Privacy-Preserving Distributed Data Mining
暂无分享,去创建一个
[1] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[2] H. Kunreuther,et al. Interdependent Security , 2003 .
[3] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[4] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[5] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[6] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[7] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[8] Luis E. Ortiz,et al. Algorithms for Interdependent Security Games , 2003, NIPS.
[9] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[10] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[11] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[12] R. Hardin,et al. Collective action as an agreeable N-prisoners''dilemma , 1971 .
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Elchanan Ben-Porath,et al. Cheap talk in games with incomplete information , 2003, J. Econ. Theory.
[15] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[16] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[17] Stephen E. Fienberg,et al. Additive noise and multiplicative bias as disclosure limitation techniques for continuous microdata: A simulation study , 2004, J. Comput. Methods Sci. Eng..
[18] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[19] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[20] Joseph Y. Halpern,et al. Ra-tional secret sharing and multiparty computation , 2004, STOC 2004.
[21] J. Morgan,et al. Cheap Talk , 2005 .
[22] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[23] Jianer Chen,et al. Performance Measurements for Privacy Preserving Data Mining , 2005, PAKDD.
[24] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[25] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..